Skype Trojan Horse

1821 Comments Off

Yesterday Websense Security Labs reported on our blog that there was a potential Worm propagating via Skype (see: http://www.websense.com/securitylabs/blog/blog.php?BlogID=101). After investigation we have discovered that this is not a self propagating worm and is actually a Trojan Horse. More .. 

Opera browser adds phishing filter

1777 Comments Off

Opera Software ASA has added a filter that blocks phishing sites to its Web browser software, following the example set by rivals Microsoft Corp. and Mozilla Corp. In version 9.1 of the Opera Web browser, released Monday, the company introduced a phishing filter that uses information from PhishTank and GeoTrust to help protect users from being duped […]

Some Stats on the Secunia Software Inspector Release

1777 Comments Off

From over 400,000 detected applications, the Software Inspector tagged over 35% as insecure versions!For IE 6.x users, 4.12% were insecure, which is a good sign; most people probably are aware of using Windows updates to get new IE versions.For Adobe Flash 9.x users, over 53% were running insecure versions; a testament to both the popularity […]

Worm Alert: Big Yellow

1821 Comments Off

The eEye Research honeypot network has recently detected a new worm that is attacking systems running versions of Symantec AntiVirus and Symantec Client Security. The “Big Yellow” worm leverages a remote, system-level access vulnerability to take control of machines running vulnerable (un-patched) Symantec software. Once infected, machines then download a package from an FTP server […]

Yahoo! Messenger Unspecified ActiveX Control Buffer Overflow

Security Bulletins / Advisories Comments Off

Description:A vulnerability has been reported in Yahoo! Messenger, which potentially can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to an unspecified error in an ActiveX control and can be exploited to cause a buffer overflow. No further information is currently available. The vulnerability is reported in versions […]

Symantec Launches Security Management and Outsourcing Services

1777 Comments Off

Symantec’s Global Services division introduced a set of new professional services on Dec. 13 that promise to help businesses manage their infrastructure and data security operations via outsourcing and on-premises consulting arrangements. Driven by demand from enterprise customers for new alternatives in mitigating their operational security risks, the Cupertino, Calif.-based company said the initial set […]

Phishing scams thrive in the UK

1777 Comments Off

UK incidents of phishing scams have grown 8,000 per cent over the last two years, according to the government’s financial watchdog authority. Although losses remain modest compared to other forms of financial fraud, banking security experts speaking before the House of Lords science and technology committee are concerned about the growing prevalence of scams designed […]

Symantec files piracy lawsuit

1777 Comments Off

Symantec has filed a copyright infringement lawsuit that alleges eight businesses and seven individuals reaped an estimated $15 million in profits from pirated copies of its most popular security software. The lawsuit, filed in a U.S. District Court in Los Angeles, comes after an investigation of more than two years, the company said. The lawsuit […]

Microsoft Security Bulletin(s) for December 2006

Security Bulletins / Advisories Comments Off

December 12, 2006 Today Microsoft released the following Security Bulletin(s). Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must […]

Cyber Extortion via Web Mail

1821 Comments Off

Websense┬« Security LabsTM has received reports of a new form of cyber-extortion. Unlike previously documented cases (where end-users were infected with malicious code, certain file types were encoded or encrypted, and a ransom message was left on the machine), this attack compromises users’ online web mail accounts. When end-users logged into their web mail accounts (in this case […]


© 2014 DP's Security Bits.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in